But we can’t associate the result with the particular AV engine…

Why…?? It’s quite obvious that avast! is AV1, isn’t it…!?

avast! is indeed #1 since it also scored 100%

My fault. It did not see the correlation between the text and the AV1, AV2…
Thanks for pointing me out this :slight_smile:

NP pal. :slight_smile:

More on this subject:
https://blog.avast.com/2012/12/13/is-google-protecting-me-after-all/

Thanks Bob. :slight_smile:

Metasploit Pro 4.5.0 Release
https://community.rapid7.com/docs/DOC-2108
https://community.rapid7.com/community/metasploit/blog/2012/12/07/go-phishing-how-to-manage-phishing-exposure-with-metasploit
https://community.rapid7.com/community/metasploit/blog/2012/12/07/metasploit-hits-1000-exploits

How to explain Hash DoS to your parents by using cats
http://www.anchor.com.au/blog/2012/12/how-to-explain-hash-dos-to-your-parents-by-using-cats/
http://crypto.junod.info/2012/12/13/hash-dos-and-btrfs/

Dirty note on Samsung Smart TV Security
http://grayhash.com/2012/12/20/samsung_smart_tv_security/

I was pretty slow in getting on-board with smart phones as security was my biggest concern. But now then have many security applications including the avast! Mobile Security app for Android.

My concerns about Smart TV are very much the same as smart phones and possibly worse, how the hell do you clean an infected smart TV. I have a Samsung LED TV and although an earlier version it has the ability to be networked and get Internet, but I rather doubt I would ever connect it.

Yes, let’s better wait until avast! for Smart TV is available. :wink:

Happy New Year Analysis of CVE-2012-4792
http://blog.exodusintel.com/2013/01/02/happy-new-year-analysis-of-cve-2012-4792/

UI Redressing Mayhem: Identification Attacks and UI Redressing on Google Chrome
http://blog.nibblesec.org/2012/12/ui-redressing-mayhem-identification.html

Nokia phone forcing traffic through proxy
http://gaurangkp.wordpress.com/2012/12/05/nokia-proxy/

Nokia’s MITM on HTTPS traffic from their phone
http://gaurangkp.wordpress.com/2013/01/09/nokia-https-mitm/

The “Red October” Campaign
An Advanced Cyber Espionage Network Targeting Diplomatic and Government Agencies
http://www.securelist.com/en/blog/785/The_Red_October_Campaign_An_Advanced_Cyber_Espionage_Network_Targeting_Diplomatic_and_Government_Agencies
http://www.securelist.com/en/analysis/204792262/Red_October_Diplomatic_Cyber_Attacks_Investigation

Watering hole attacks continue (with a twist)
http://blog.avast.com/2013/01/15/watering-hole-attacks-continue-with-a-twist/

Mozilla Minion: What, Why, and How
https://wiki.mozilla.org/Security/Projects/Minion
http://yboily.tumblr.com/post/35078757244/minion-what-why-and-how

Silent installs of add-ons still possible in Firefox
http://www.h-online.com/open/news/item/Silent-installs-of-add-ons-still-possible-in-Firefox-1787297.html
http://research.zscaler.com/2012/09/how-to-install-silently-malicious.html

not good at all … I guess they already know it for ages (Mozilla) … I’ll try to report that anyway.

edit: reported on their user’s feedback page as well as on the bug tracker.